Microsoft Word or MS-Word Is An: Application Software Save Documents
Microsoft Word or MS-Word Is An: Application Software Save Documents
A) word B) It being C) MB D) TB
B) graphics A) The
processing versatile enough Answer & Explanation Answer: D) TB
software software doing
software to handle the job Q:
Which of the following is the storage Answer & Explanation Answer: B)
area within the computer itself interpreter D) Analytical
C) Calculator
which holds data only temporarily as Q: Engine
the computer process instructions? Computer programs are written in a Answer & Explanation Answer: D)
high level programming language, Analytical Engine
A) the hard B) main however the human readable
disk memory version of a program is called Explanation:
_______ Computer was invented by Charles
C) the D) read-only Babbage.
control unit memory B) The First Mechanical
A) Cache
Answer & Explanation Answer: B) Instruction set Computer Designed by Charles
main memory Babbage, a British mathematician
Q: C) Source D) None of was called as Analytical Engine
Programs designed specifically to code these which resembles today's modern
address general purpose applications Answer & Explanation Answer: C) machines between 1833 and 1871.
and special-purpose applications are Source code Q:
called ...... Q: Which type of memory holds only
The unit MIPS is used to measure the the program and data that the CPU is
A) speed of a___. presently processing?
Management B) System
Information Software B) Tape A) CMOS B) ROM
A) Disk drive
System drive
C) RAM D) ASCII
C) C) Printer D) Processor Answer & Explanation Answer: C)
D) None of
Application Answer & Explanation Answer: D) RAM
these
Software Processor Q:
Answer & Explanation Answer: C) The ..... key and the ..... key can be
Application Software Explanation: used in combination with other keys
_______ uses laser technology to MIPS refers millions instruction per to perform shortcuts and special
store large amount of information sec and is used to measure the tasks
speed of Processor.
A) Floppy Q: A) Control, B) Function,
B) CD-ROM
disk Which media have the ability to have Alt Toggle
data/information stored (written) on
C) Hard disk D) ED-ROM C) Caps D) None of
them by users more than once?
Answer & Explanation Answer: B) lock,Num lock these
CD-ROM B) CD-RW Answer & Explanation Answer: A)
A) CD-R disks
Q: disks Control, Alt
A ______ is a computer attached to Q:
the internet that runs a special Web D) Optical When you save to this, your data will
C) Zip disks
server software and can send Web disks remain intact even when the
pages out to other computers over Answer & Explanation Answer: B) computer is turned off ____
the internet. CD-RW disks
Q: B) Mother
B) web A) RAM
A) web client Storage which stores or retains data board
system after power off is called____
C) Secondary D) Primary
D) Web A) Volatile B) Non- storage device storage device
C) web page
server storage volatile storage Answer & Explanation Answer: C)
Answer & Explanation Answer: D) Secondary storage device
Web server C) Q:
D) Direct
Q: Sequential Output devices make it possible to
storage
The ______ is a box that houses the storage
most important parts of a computer Answer & Explanation Answer: B) A) View and B) Scan a
system. Non-volatile storage print a data data
When you cut or copy information it
A) Software B) Hardware gets place in the___________ C) Input a D) Sending a
data data
C) Input D) System B) Mother Answer & Explanation Answer: A)
drive unit A) Clipboard
board View and print a data
Answer & Explanation Answer: D) Q:
System unit D) None of A(n) .......... is a small group of
C) RAM
Q: these computers and peripherals linked
_______ converts and executes one Answer & Explanation Answer: A) together in a small geographic area.
statement at a time Clipboard
Q: A) WAN B) PAN
B) The First Mechanical
A) compiler
interpreter Computer Designed by Charles C) LAN D) CAN
Babbage was called? Answer & Explanation Answer: C)
D) LAN
C) converter
instructions A) Super Q:
B) Abacus
Computer Secondary storage ________
A) does not B) does not C) Worm D) File virus C) instant D)
require constant use magnetic Answer & Explanation Answer: A) messenger programmer
power media Trojan horses Answer & Explanation Answer: B)
Q: hacker
C) consists D) does not PARAM was developed by Q:
of four main store information Most websites have a main page ,
types of devices for later retrieval A) C-DAC B) IIT Kanpur the ______ which acts as a doorway
Answer & Explanation Answer: A) to the rest of the website pages.
does not require constant power C) BARC D) IIT Delhi
Several computers linked to a server Answer & Explanation Answer: A) C- A) Search B) Home
to share programs and storage DAC engine page
space________ Q:
Most application software today C) Browser D) URL
A) Network B) Grouping comes with an interface called Answer & Explanation Answer: B)
Home page
D) A) Graphical B) Character Q:
C) Library Integrated user interface user interface _________ is a process of searching
system bugs in software
Answer & Explanation Answer: A) C) Icon user D) Button
Network interface user interface A) Compiling B) Testing
Q: Answer & Explanation Answer: A)
Digital computers use a ......... system Graphical user interface D)
C) Runnung
to encode date and programs. Any letter, number, or symbol found Debugging
on the keyboard that you can type Answer & Explanation Answer: D)
A) into the computer........... Debugging
B) decimal
semiconductor Q:
A) Output B) Type The "home page" of a website
C) binary D) RAM is....................
Answer & Explanation Answer: C) C) Character D) Print
binary Answer & Explanation Answer: C) A) The first B) The
Q: Character page largest page
A Computer works on a _______ Q:
number system If a new device is attached to a C) The most D) The last
computer, such as printer or colorful page page
A) binary B) octal scanner, its ______ must be installed Answer & Explanation Answer: B)
before the device can be used The largest page
D) A modem ______
C) decimal
hexadecimal A) buffer B) driver
Answer & Explanation Answer: A) A) translates B) translates
binary C) pager D) server analog signals digital signals
Q: Answer & Explanation Answer: B) from a computer from a computer
The symbols used in an assembly driver into digital into analog
language are called ? Q: signals that can signals that can
Which of the following could be travel along travel along
A) B) digital input devices for computers? conventional conventional
Assembler Mnemonics telephone lines telephone lines
A) Digital B)
D) All of the camcorder Microphone C) D)
C) Codes
above demodulates modulates
Answer & Explanation Answer: B) D) All of the digital signals signals an analog
C) Scanner
Mnemonics above from a computer telephone line
Q: Answer & Explanation Answer: D) All Answer & Explanation Answer: B)
OCR stands for of the above translates digital signals from a
Q: computer into analog signals that
A) Optical Inventor of WWW is ______
B) Optical can travel along conventional
Character
CPU Recognition B) telephone lines
Recognition A) Bill Gates
Lee.N.Feyong Q:
C) Optimal D) Other Which motherboard form factor uses
Character Character D) Tim one 20 pin connector?
C) N. Resscl
Rendering Restoration Berners Lee
A) Baby AT B) AT
Answer & Explanation Answer: A) Answer & Explanation Answer: D)
Optical Character Recognition Tim Berners Lee D) All the
Q: C) ATX
Q: above
What is the name of the virus that A person who used his or her Answer & Explanation Answer: C)
fool a user into downloading and expertise to gain access to other ATX
executing them by pretending to be people's computers to get
useful applications ? information illegally or do damage is Explanation:
a ________ ATX (Advanced Technology
A) Trojan
B) Keylogger A) spammer B) hacker extended) is a motherboard form
horses
factor uses one 20 pin connector.
During Processing data, programs,
ATX is developed by Intel in 1995 to and processed information are held C) SHIFT+C, D) SHIFT+C,
improve on previous de facto temporarily in _________ ALT+V ALT+P
standards like the AT form factor. It Answer & Explanation Answer: A)
was the first major change in A) Secodary CTRL+C, CTRL+V
B) ROM
desktop computer enclosure, stoage Q:
motherboard, and power supply In order to e-mail a Word document
D) None of from within Word _______
design in many years, improving C) RAM
these
standardization and
Answer & Explanation Answer: C) A) Go to B) Save the
interchangeability of parts.
RAM file/Send To/Mail file as an e-mail
Q:
The primary purpose of an operating Recipient attachment
Who is the father of email ?
system is ?
A) Charles B) Ray C) Start
Babbage Tomlinson A) To allow B) To make outlook and D) This is an
people to use the computers easier attach the file impossible
C) Tim D) Paul computer to use while open in operation
Berners Lee Buchheit word
D) To make Answer & Explanation Answer: A) Go
Answer & Explanation Answer: B) C) To keep
the most to file/Send To/Mail Recipient
Ray Tomlinson systems
efficient use of Q:
programmers
the computer Documentation of computer
Explanation: employed
hardware programs is impograms is important
Email inventor Ray Tomlinson dies at
74. Ray Tomlinson, who sent the Answer & Explanation Answer: D) To so that ________
first e-mail, has died. make the most efficient use of the
computer hardware B) other
Q:
A) users can programmers
Delayed payload of some viruses is
Explanation: learn how to use can know how to
also called as _____
The primary purpose of an operating the program maintain the
B) Late - system is to make the most efficient program
A) Bomb
Virus use of the computer hardware.
Q: C) the
C) Time D) Anti-virus A program which helps create programer can
Answer & Explanation Answer: A) written documents and lets you go see why the code
D) all of
Bomb back and make corrections as is written that
above
Q: necesary ______ way while
Windows 95, Windows 98, and hunting for
Windows NT are known as what? A) B) Personal sources of error
Spreadsheet writer Answer & Explanation Answer: D) all
B) domain of above
A) Processor C) Word D) Word
names Q:
printer processor ...... this is the act of copying or
D) operating Answer & Explanation Answer: D) downloading a program from a
C) modems
systems Word processor network and making multiple copies
Answer & Explanation Answer: D) Q: of it
operating systems Storage and memory differ with
Q: respect to which of the following A) Network
B) Plagiarism
A button that makes characters characteristics? piracy
either upper or lower case and
numbers to symbols___ A) Price B) Reliability C) Software D) Site-
piracy Licency piracy
A) Shift B) Ctrl D) All of Answer & Explanation Answer: C)
C) Speed
these Software piracy
D) Back Answer & Explanation Answer: D) All What is "Trend Micro" ?
C) Space bar
space of these
Answer & Explanation Answer: A) Q: B) It is an
A) Name of
Shift Who governs the INTERNET ? electronic
an insect
Q: machine
A CD-ROM disk _______ A) ISOC B) IETF
C) It is anti-
D) All of the D) None
A) cannot be B) has more C) IAB virus software
erased and storage capacity above Answer & Explanation Answer: C) It
rewritten than a CD-R Answer & Explanation Answer: D) All is anti-virus software
of the above
C) holds less Q: Explanation:
D) Can be
data than a You can use ______ to copy selected Q:
written only once
floppy disk text, and ____to paste it in a The command used to remove text
Answer & Explanation Answer: A) document or graphics from a document. The
cannot be erased and rewritten information is then stored on a
Q: A) CTRL+C, B) CTRL+C,
clipboard so you can paste it.
CTRL+V CTRL+P
A) cut B) Chop
phase in a document is to use the first computer so named with first
C) Cart away D) Clip command alphabets of English
Answer & Explanation Answer: A) cut Q:
Q: A) Replace B) Find What is the name for the process
What command is used to count the that is used to convert a series of
total number of lines, words, and C) Lookup D) Search
instructions or programs, written in a
characters contained in a file ? Answer & Explanation Answer: B) high-level language into
Find instructions(or a program) that can
A) wc B) count p What is backup? be run on a computer?
C) wcount D) countw B) Copy to A)
A) Connect B) Compiling
Answer & Explanation Answer: A) wc save a data from Assembling
his network to
original source to
more component
Explanation: other destination C)
D) Uploading
Q: Translating
What is the most common way to C) Filter an
D) Access Answer & Explanation Answer: B)
get a virus in your computers hard old data from
data from tape Compiling
disk? new data
Q:
Answer & Explanation Answer: B) Which of the following virus
A) By Copy to save a data from original
B) By overtake computer system, when it
installing games source to other destination
opening e-mails boots and destroy information ?
from CD ROMs Q:
A........ can operate at high speeds A) System
C) By B) Trojan
and can support hundreds of users infectors
uploading
D) By
pictures from B) C) Stealth D) Boot
sending e-mails A) Micro
mobile to the Mainframe virus infectors
computer
computers computer Answer & Explanation Answer: C)
Answer & Explanation Answer: B) By Stealth virus
opening e-mails C) Super D) Mini
Q:
Q: computer computer
A method of providing virtual
The two types of output devices are Answer & Explanation Answer: B) memory is called _____.
Mainframe computer
A) Monitor B) Floppy Q: A) B)
and Printer disc and CD What is an e-mail? Fragmentation Segmentation
C) Keyboard D) None of B) An online C) De-
A) An D) Paging
and Mouse these area on which a fragmentation
internet
Answer & Explanation Answer: A) user can Answer & Explanation Answer: B)
standard, which
Monitor and Printer converse in Segmentation
aqllow users to
Q: written form Q:
upload and
The difference between a virus and a about any special Information on a computer is stored
download files
self-replicating program which is like subject as _________
a virus is that rather than creating
copies of itself on only one system it C) A) analog B) digital
propagate through computer Transmission of data data
network. What is that called as files and D) A real
_____ messages time typed C) modem D) watts
through conversation data data
A) Keylogger B) Worm computer Answer & Explanation Answer: B)
network digital data
C) Time Answer & Explanation Answer: C) Which of the following is a true
D) Cracker
Bomb Transmission of files and messages statement about Intranet and
Answer & Explanation Answer: B) through computer network Internet ?
Worm Q:
Q: Why ABC computer is called so ? A)
B) They use
In computer short cut keys, F4 key is Encryption is
similar protocol
used to A) Because it necessary
was thought to
A) To display B) Because it D) They use
B) To display be the first C) Speed is
the items in the was developed the same
help computer so slow
active list by Atanasoff and protocol
named with first
Berry
alphabets of Answer & Explanation Answer: D)
C) To display English They use the same protocol
system D) To display Q:
properties dialog desktop C) Both of What is amodem connected to?
box above are the
D) None of
Answer & Explanation Answer: A) To reason to name B) mother
the above A) processor
display the items in the active list the computer board
Q: ABC
The quickest and easiest way in D) phone
Answer & Explanation Answer: A) C) printer
word, to locate a particular word or line
Because it was thought to be the
Q: addressable by the CPU and requires The original ASCII code used
Unsolicited e-mail is called a ______ special software called EMS ? ___________ bits of each byte,
reserving that last bit for error
A) A) Expanded B) Base checking ?
B) Usenet
Newsgroup
C) A) 5 B) 6
D) None
C) Backbane D) Spam Conventional
Answer & Explanation Answer: D) Answer & Explanation Answer: A) C) 7 D) 8
Spam Expanded Answer & Explanation Answer: C) 7
Q: Q: Q:
The combination of operating ______ is the maximum amount of Which of the following memories
system and processor in a computer data that can be stored on a storage needs refresh ?
is reffered to as a computers medium.
________ A) DRAM B) ROM
A) Magnetic B) Optical
B) storage storage D) All of the
A) firmware C) SRAM
specifications above
C) Solid- D) Storage Answer & Explanation Answer: A)
C) minimum state storage capacity DRAM
D) platform
requirements Answer & Explanation Answer: D) Q:
Answer & Explanation Answer: D) Storage capacity Symbolic logic was discovered by
platform Q: ___________
Q: What is e-commerce?
RAM is ____ and ____ A) Herman B) Vonn
B) Buying Hollerith Neumann
A) Buying
B) and selling
A) volatile, and selling C) George D) Sun
nonvolatile, products and
temporary international Boole Microsystem
permanent services not
goods
found in stores Answer & Explanation Answer: C)
C) George Boole
D) volatile,
nonvolatile, C) Buying D) Buying Which of the following refers to the
permanent
temporary and selling and selling fastest, biggest, and most expansive
Answer & Explanation Answer: A) products and products having computer?
volatile, temporary services over the to do with
Q: internet computer A) Personal B) Super
If you are going to a site you use Answer & Explanation Answer: C) computer computer
often, instead of having to type in Buying and selling products and
D) None of
the address every time, you services over the internet C) Laptop
these
should_______ Q:
The function of an assembler is Answer & Explanation Answer: B)
A) Save it as B) Make a ________ Super computer
a file copy of it Q:
A) To B) To How do you display current date and
C) Bookmark D) None of convert basic convert high time in MS Excel ?
it these language into level language
Answer & Explanation Answer: C) machine into machine A) Time () B) Now ()
Bookmark it language language
C) Date () D) Today ()
Q:
A series of instructions that tells a C) To D) To Answer & Explanation Answer: B)
computer what to do and how to do convert assemble convert assemble Now ()
it is called a _______ language into language into Q:
machine high level Hard copy of a document is
A) Program B) Command language language
A) Printed B) Stored in
Answer & Explanation Answer: C) To on printer floppy
C) User
D) Processor convert assemble language into
response
machine language C) Store in D) Store in
Answer & Explanation Answer: A) Q: CD hard disk
Program What does a Browser do?
Q: Answer & Explanation Answer: A)
Which of these is not a means of A) Looks Printed on printer
personal communication on the through B) Reads Q:
internet ? magazines and meterial really Which is NOT a good Web security
books in the fast strategy ?
A) Instant library
B) Chat B) Add demo
messaging
C) It D) It is A) Remove programs, so
C) Electronic D) provides help software used to unnecessary users can test
mail Instanotes menus view web pages compilers and system without
Answer & Explanation Answer: D) interpreters accessing
Answer & Explanation Answer: D) It production data
Instanotes is software used to view web pages
Which type of memory is not directly Q:
Answer & Explanation Answer: A)
D) Restrict Internet Explanation:
C) Limit the access to the Q: RAM is located
users who can Web server keep The common name for the crime of in The central processing unit (CPU),
load software, a minimum stealing passwords is also called a processor, is located
edit or add files number of ports inside the computer case on the
open A) Spoofing B) Surfing motherboard. It is sometimes called
Answer & Explanation Answer: A) the brain of the computer, and its
Remove unnecessary compilers and C) Identity
D) Speeling job is to carry out commands.
interpreters Theft
Q:
Q: Answer & Explanation Answer: A) V-RAM is used for access of the
Expansion cards are inserted into Spoofing following ?
A) Peripheral Explanation: B) Video &
B) Pegs A) Programs
Devices A spoofing attack is a situation in Graphics
which one individual or program
D) The back effectively disguises or mask as C) Text &
C) Slots D) All
of the computer another by falsifying information and Images
Answer & Explanation Answer: C) thereby gaining up an ill-conceived Answer & Explanation Answer: B)
Slots advantage. It may use for stealing Video & Graphics
In computing, the expansion card password or IP addresses.
or board or accessory card is a Q: Explanation:
printed circuit board that can Which Company is the biggest player VRAM or (video RAM), reference to
be inserted into an electrical in the microprocessor industry ? any type of random access memory
connector or expansion slot, on a (RAM) is a dual-ported variant of
computer motherboard, to add A) AMD B) IBM dynamic RAM (DRAM) used to store
functionality to a computer system the framebuffer in graphics
via the expansion bus. C) Motorola D) Intel
adapters.
Q: Answer & Explanation Answer: D) What Does BIOS Stand For
__________ cookies are also known Intel
as transient cookies. Q: A) Backup B) Battery
What is the maximum number of Input Output Integrated
B) Second characters when applying MsgBox System Operating Setup
A) Persistent
party and InputBox ?
Answer D) Better
D) Third C) Basic
C) Session The maximum number of characters Integrated
party Input Output
allowed is 1024 characters. Operating
System
Answer & Explanation Answer: C) Q: System
Session Which is the World's Fastest Answer & Explanation Answer: C)
Q: SUPERCOMPUTER and to which Basic Input Output System
What could cause a Fixed Disk Error? country it belongs ?
Explanation:
A) Slow B) RAM A) JAGUAR -- B) PARAM BIOS in computers stands for Basic
Processor Speed Space - ENGLAND YUVA 2 --- INDIA Input Output System.
C) Incorrect BIOS is a set of computer
D) None C) CRAY-1 --- D) TIANHE 2
CMOS Settings instructions in firmware which
ENGLAND --- CHINA
control input and output operations.
Answer & Explanation Answer: C) Answer & Explanation Answer: D) Q:
Incorrect CMOS Settings TIANHE 2 --- CHINA The two kinds of Main Memory are
Q: Q:
What kind of attempts is made by _________ is a specialized server A) Random B) ROM and
individuals to obtain confidential that enables the client to share and sequential RAM
information from a person by application and data across the
falsifying their identity ? network. C) Primary D) All the
and secondary above
A) Spyware B) Phishing A) Mass
B) File server Answer & Explanation Answer: B)
scams scams Server ROM and RAM
C) Computer C) Data D) Host
D) None Explanation:
viruses Server Server
The main memory is defined as the
Answer & Explanation Answer: B) Answer & Explanation Answer: B) central storage in a computer.
Phishing scams File server (noun) An example of the main
Select the odd term out of the Q: memory is where programs and data
following? Where is RAM located? are kept when the processor is
B) A) Mother B) Expansion actively using them.
A) Internet The main storage region of a
Macintosh OSX Board Board
computer, to which the central
C) Linux D) Windows C) External processor has immediate or direct
Mint 8.1 D) None access is of two kinds. They are ::
Drive
Answer & Explanation Answer: A) RAM -- Random Access Memory
Mother Board ROM -- Read Only Memory.
Q:
Missing Slot Covers on a Computer B) Token C) Plotter D) Screen
A) Ethernet
can cause Ring Answer & Explanation Answer: D)
Screen
B) C) Bus Token D) None
A) Power
Incomplete Path Answer & Explanation Answer: B) Explanation:
Surges
of ESD Token Ring A touch screen is the only device
Q: which works as both an input and an
C) Over Which of the following is NOT a output device among the given
D) EMI
Haeat Software? options. You view the options
Answer & Explanation Answer: C) available to you on the screen
Over Haeat A) Compiler B) Adobe
(output) and you then use your
C) Microsoft finger to touch the option that you
Explanation: D) Drivers have chosen (input).
Office
The slot covers on a computer Hence, Screen is not purely output
reduce the dust build up inside the Answer & Explanation Answer: A)
device.
computer. So the slot covers should Compiler
Q:
be present in proper place.The Which of the following is not an
missing covers can disrupt the Explanation:
Input device?
airflow design of the case and cause A compiler is not a software.
overheating problems. Adobe, Microsoft office and Drivers B)
are all software on a computer. A) Joystick
Q: Headphones
Programs stored in ROM are called Q:
Is DRAM Volatile or Nonvolatile? C) Mouse D) Scanner
A) Hardware B) Firmware Answer Answer & Explanation Answer: B)
DRAM is a Volatile random-access Headphones
C) Freeware D) Software memory (VRAM).
Answer & Explanation Answer: B) Volatile random-access memory Explanation:
Firmware (VRAM) is random-access memory Here Joystick, Mouse and Scanner
that retains its information when are Input devices through which data
Explanation: power is turned on. is given to the computers. But
The programs which are as Examples of volatile memory are Headphones are output devices
permanent as hardware and stored primary storage (typically dynamic through which sound comes as an
in ROM are known as Firmware. RAM, DRAM), and fast CPU cache output from the computer or any
Data stored in ROM can only be memory (typically static RAM, SRAM, devices.
modified slowly, with difficulty, or which is fast but energy-consuming Q:
not at all, so it is mainly used to store and offer lower memory capacity per Computer storage units smallest to
firmware (software that is closely area unit than DRAM). largest?
tied to specific hardware, and Non-volatile random-access memory Answer
unlikely to need frequent updates) (NVRAM) is random-access memory The smallest unit of data storage in a
or application software in plug-in that retains its information when computer is called Bit (Binary Digit).
cartridges. power is turned off. Half a byte (four bits) is called a
Q: Nibble.
What are the four main functions of Examples of non-volatile memory 1 bit (binary digit) = the value of 0 or
a computer? are flash memory (used as secondary 1
memory) and ROM, PROM, EPROM 8 bits = 1 byte
B) and EEPROM memory (used for 1024 bytes = 1 kilobyte
A) Data, Hardware, storing firmware such as BIOS). 1024 kilobytes = 1 megabyte
information, bits software,
1024 megabytes = 1 gigabyte
and bytes modeling and Which of the following is not a 1024 gigabytes = 1 terabyte
operations function of the Control Unit? 1024 terabytes = 1 petabyte
C) Input, D) Learning, Hence, Computer storage units
A) Interpret B) Read
processing, thinking, smallest to largest i.e, in ascending
instructions instructions
output and intelligence and order is
storage virtuosity C) Execute D) Direct 1 bit < 1 byte < 1 KB < 1 MB < 1
instructions operations GB < 1TB < 1 PB.
Answer & Explanation Answer: C)
Q:
Input, processing, output and Answer & Explanation Answer: B)
The flow of information through MIS
storage Read instructions
is
Explanation: Explanation: A) B)
The four main functions of a Control Unit can perform the organization information
computer are :: functions Interpret instructions, dependent dependent
Execute instructions and Direct
1. Input, operations. But Reading instructions C)
D) need
2. Processing, is not a function of the Control Unit. management
dependent
3. Output and Q: dependent
4. Storage Which of the following is not purely Answer & Explanation Answer: D)
Q: output device? need dependent
The popular Access Method for
computer network is A) Printer B) Speaker
Explanation:
The flow of information through MIS The World Wide Web Consortium
- Management Information System is (W3C) is an international community Explanation:
Need dependent. where Member organizations, a full- In MS-Word, the Ruler function helps
The backbone of any organization is time staff, and the public work align the text, graphic, tables or
Information. The information of MIS together to develop Web standards. other elements in your document.
comes from both internal and Led by Web inventor and Director Q:
external sources. Tim Berners-Lee and CEO Jeffrey Size of the primary memory of a pc
Q: Jaffe, W3C's mission is to lead the ranges between
Can character data be stored in Web to its full potential.
computer memory? Q: A) 256 kb to B) 64 kb to
System Study involves 640 kb 256 kb
A) Yes---a B) No---
primitive data computer B) C) 256 kb to D) 2 kb to 8
type is used to memory can only identifying 512 kb kb
A)
store characters store patterns current Answer & Explanation Answer: A)
documenting the
deficiencies and 256 kb to 640 kb
C) Yes--- D) No--- existing system
establishing new
characters are computers can goals Explanation:
stored in special only store Size of the primary memory of a PC
memory numbers C) study of ranges between 256 KB to 640 KB.
D) All the
Answer & Explanation Answer: A) an existing Q:
above
Yes---a primitive data type is used to system A report generator is used to
store characters Answer & Explanation Answer: D) All
the above A) print files
B) data entry
Explanation: on paper
Q: Explanation:
C) update D) All the
Which of the following is not an Q:
files above
Output device? Digitized information can be used by
computers. Answer & Explanation Answer: A)
A) Scanner B) Moniter print files on paper
A) TRUE B) FALSE
C) Printer D) Speakers Explanation:
Answer & Explanation Answer: A) A report generator is a computer
Answer & Explanation Answer: A)
Scanner program whose purpose is to take
TRUE
data from a source such as a
Explanation: database, XML stream or a
Explanation:
Q: spreadsheet, and use it to produce a
TRUE. The computers and electronic
Programs stored in ROM are called document in a format which satisfies
devices use digitized information
a particular human readership.
A) Firmware B) Software which is easily understood by them.
Hence, A report generator is used
Digitization is the process of
to print files on paper.
D) None of converting analog signals or
C) Hardware Q:
above information of any form into a digital
Which protocol does ping use?
Answer & Explanation Answer: A) format that can be understood by
Firmware computer systems or electronic A) ICMP B) TCP
devices. The term is used when
Explanation: converting information, like text, C) BootP D) ARP
ROM stands for read-only-memory. images or voices, and sounds, into Answer & Explanation Answer: A)
It's used to store the start-up binary code. ICMP
instructions for a computer, also Q:
known as the firmware. Which key is used for the last action? Explanation:
Most modern computers use flash- ICMP means Internet Control
A) Ctrl + D B) Alt + Z
based ROM. It is part of the BIOS Message Protocol and is always
chip, which is located on the C) Ctrl + Z D) Alt + D coupled with the IP protocol (There
motherboard. are 2 ICMP variants one for IPv4 and
Answer & Explanation Answer: C)
World Wide Web is being standard one for IPv6.) echo request and echo
Ctrl + Z
by response are the two operation
codes of ICMP used to implement
B) World Explanation:
ping.
A) W3C Wide Web For undo the action or last action
Which technology is used in compact
Standard [Ctrl + Z] is used.
disks?
Q:
C) In MS-Word, for what does ruler B)
D) World A) Laser
Worldwide help? Mechanical
Wide Consortium
corporation
A) to set B) to change D) Electro
Answer & Explanation Answer: A) C) Electrical
indents page margins magnetic
W3C
C) to set D) All the Answer & Explanation Answer: A)
Explanation: tabs above Laser
World Wide Web is being standard
Answer & Explanation Answer: D) All
by W3C. Explanation:
the above
Compact disc (CD) is a digital optical speed refers to the number of pulses
disc data storage format that was co- per second generated by an C) Both of D) None of
developed by Philips and Sony and oscillator that sets the tempo for the above above
released in 1982. processor. Clock speed is usually Answer & Explanation Answer: A)
These are actually made to replace measured in Hertz (Hz). Format Cells dialog box Alignment
floppy disks that were used to store But now-a-days, a pure processor's Tab
files and programs from the performance is measured in MIPS
computer. (Millions of Instructions Per Second). Explanation:
The format was originally developed As here in the question, how a Fifth generation computer is also
to store and play only sound processor's speed is measured is known as
recordings but was later adapted for asked and it is Hertz.
B)
storage of data (CD-ROM). Hence, Processor's speed of a
A) Very Knowledge
These CD's uses Laser technology. computer is measured in Hertz(Hz)
Large Scale information
Q: [MHz, GHz].
Integration (VLSI) processing
Is MS Word an operating system? Q:
system
Which of the following data
A) TRUE B) FALSE structure is linear type? C) Both A & D) None of
B) Binary B the above
Answer & Explanation Answer: B) A) Tree Answer & Explanation Answer: B)
Tree
FALSE Knowledge information processing
C) Queue D) Graph system
Explanation:
Answer & Explanation Answer: C)
False. MS-Word is not an Operating Explanation:
Queue
system. Q:
Microsoft Word or MS-Word is The depth of a complete binary tree
Explanation:
an Application software developed is given by
A data structure is a specialized
by the company Microsoft. It allows
format for organizing and storing
users to Type and Save documents. A) Dn = log 2 B) Dn = log
data. General data structure types
Q: (n+1) 1/2 (n+1)
include the array, the file, the
Where are saved files stored in
record, the table, the tree, and so C) Dn = log D) Dn = log 2
computer ?
on. Any data structure is designed to (n+1) (n-1)
A) Hard disk B) Cache organize data to suit a specific
Answer & Explanation Answer: A) Dn
purpose so that it can be accessed
= log 2 (n+1)
D) Any of and worked with in appropriate
C) RAM
above ways.
Explanation:
Answer & Explanation Answer: A) Linear data structure: A linear data
A complete binary tree is a binary
Hard disk structure traverses the data
tree where all the levels have
elements sequentially, in which only
maximum number of nodes except
Explanation: one data element can directly be
possibly the last level.
Most operating systems reached.
The depth of complete binary tree
store files on a hard disk. Ex: Arrays, Linked Lists, Stack,
of n nodes will be Dn=log 2 (n+1)
Q: Queue, Any type of List all are linear.
where Dn is the height or depth of
The memory unit is one part of Trees like Binary Tree, B Tree or B+
the tree and n is the number of
Tree are examples of non linear data
A) Input B) Central nodes.
structure.
Device Processing Unit Q:
Q:
When a computer prints a report this
The process of encoding refers to
C) Control D) Output output is called
Unit device B) the recall
A) getting A) Soft copy B) Hard copy
Answer & Explanation Answer: B) of information
information into
Central Processing Unit previously C) Printing D) Program
memory.
learned.
Answer & Explanation Answer: B)
Explanation: Hard copy
In a computer, memory is one part C) a clear D) the
of Central processing unit i.e, CPU. memory of an persistence of
emotionally learning over Explanation:
Q: Hard copy is the output which is
Processor's speed of a computer is significant event. time.
printed by the computer.
measured in Answer & Explanation Answer: A)
Q:
getting information into memory.
A) Hertz B) Baud CTRL + ] is used for
Explanation: B) Right
C) MIPS D) BPS Encoding refers to the getting A) Re-do
align text
Answer & Explanation Answer: A) information into memory.
Hertz Q: D) Expand or
C) Increase
Merge cells option can be applied collapse the
Explanation: in font size
from? ribbon
CPU speed is the central factor in a Answer & Explanation Answer: C)
computer's performance. And this A) Format B)
Increase in font size
CPU speed depends on the processor Cells dialog box Formatting
in the CPU chip. In a computer, clock Alignment Tab toolbar
document or somewhere else, it is
Explanation: temporarily stored in clipboard. A) Graphical
B) Graph
CTRL + ] is a computer shortcut and Q: Universal
Use Interface
is used for Increase in font size. CPU speed of a personal computer is Interface
A) Large B) Set of
number of cells wires
C) Set of D) None of
circuits the above
Answer & Explanation Answer: A)
Large number of cells
Explanation:
In computing, memory refers to the
computer hardware integrated
circuits that store information for
immediate use in a computer.
Most semiconductor memory is
organized into memory cells or
bistable flip-flops, each storing one
bit (0 or 1).
A) Cell B) Menu
C) Key D) Field
Answer & Explanation Answer: A)
Cell
Explanation:
The intersection of a column and a
row in a spread sheet is called as a
cell or a bon